首页 > 最新文献

2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

英文 中文
Experimental validations of bandwidth compressed multicarrier signals 带宽压缩多载波信号的实验验证
T. Xu, I. Darwazeh
We comprehensively summarize experimental validations 1 of bandwidth compressed multicarrier waveforms for future 5th generation (5G) applications. The proposed waveforms are derived from an existing non-orthogonal multicarrier concept termed spectrally efficient frequency division multiplexing (SEFDM) where sub-carriers are non-orthogonally packed at frequencies below the symbol rate. This improves the spectral efficiency at the cost of self-created inter carrier interference (ICI). In this work, experiments are reported and testing is carried out in three scenarios including long term evolution (LTE)-like wireless link; millimeter wave radio-over-fiber (RoF) link and optical fiber link. In the first scenario, for a given 25 MHz bandwidth, the SEFDM testbed can provide 70 Mbit/s gross data rate while only 50 Mbit/s can be achieved for an OFDM system occupying the same bandwidth. For the millimeter wave experiment, occupying a 1.125 GHz bandwidth, the gross bit rate for OFDM is 2.25 Gbit/s and with 40% bandwidth compression, 3.75 Gbit/s can be achieved for SEFDM. Two experimental optical fiber links are described in this work; a 10 Gbit/s direct detection optical SEFDM system and a 24 Gbit/s coherent detection SEFDM system. The LTE-like signals and millimeter wave technologies are well suited to provide last mile communications to end users as both can support mobility in wireless environments. The lightwave signals delivered by optical fibers would offer higher data rates and support long-haul communications. The reported techniques, used individually or combined, would be of interest to future wireless system designers, where bandwidth saving is of importance, such as in 5G networks, aiming to provide high capacity and high mobility, simultaneously while saving spectrum.
我们全面总结了用于未来第五代(5G)应用的带宽压缩多载波波形的实验验证1。所提出的波形来源于现有的非正交多载波概念,称为频谱高效频分复用(SEFDM),其中子载波在低于符号速率的频率上非正交填充。这提高了频谱效率,但代价是自产生载波间干扰(ICI)。在这项工作中,报告了实验并在三种场景下进行了测试,包括长期演进(LTE)无线链路;毫米波光纤无线链路和光纤链路。在第一个场景中,对于给定的25 MHz带宽,SEFDM测试平台可以提供70 Mbit/s的总数据速率,而占用相同带宽的OFDM系统只能达到50 Mbit/s。在毫米波实验中,OFDM的总比特率为2.25 Gbit/s,占用1.125 GHz的带宽,在40%的带宽压缩下,SEFDM的总比特率为3.75 Gbit/s。本文介绍了两种实验光纤链路;10gbit /s直接检测光学SEFDM系统和24gbit /s相干检测SEFDM系统。类lte信号和毫米波技术非常适合为最终用户提供最后一英里通信,因为两者都可以支持无线环境中的移动性。光纤传输的光波信号将提供更高的数据速率,并支持长途通信。报告的技术,单独使用或组合使用,将对未来的无线系统设计人员感兴趣,其中带宽节省很重要,例如在5G网络中,旨在提供高容量和高移动性,同时节省频谱。
{"title":"Experimental validations of bandwidth compressed multicarrier signals","authors":"T. Xu, I. Darwazeh","doi":"10.1109/WoWMoM.2016.7523580","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523580","url":null,"abstract":"We comprehensively summarize experimental validations 1 of bandwidth compressed multicarrier waveforms for future 5th generation (5G) applications. The proposed waveforms are derived from an existing non-orthogonal multicarrier concept termed spectrally efficient frequency division multiplexing (SEFDM) where sub-carriers are non-orthogonally packed at frequencies below the symbol rate. This improves the spectral efficiency at the cost of self-created inter carrier interference (ICI). In this work, experiments are reported and testing is carried out in three scenarios including long term evolution (LTE)-like wireless link; millimeter wave radio-over-fiber (RoF) link and optical fiber link. In the first scenario, for a given 25 MHz bandwidth, the SEFDM testbed can provide 70 Mbit/s gross data rate while only 50 Mbit/s can be achieved for an OFDM system occupying the same bandwidth. For the millimeter wave experiment, occupying a 1.125 GHz bandwidth, the gross bit rate for OFDM is 2.25 Gbit/s and with 40% bandwidth compression, 3.75 Gbit/s can be achieved for SEFDM. Two experimental optical fiber links are described in this work; a 10 Gbit/s direct detection optical SEFDM system and a 24 Gbit/s coherent detection SEFDM system. The LTE-like signals and millimeter wave technologies are well suited to provide last mile communications to end users as both can support mobility in wireless environments. The lightwave signals delivered by optical fibers would offer higher data rates and support long-haul communications. The reported techniques, used individually or combined, would be of interest to future wireless system designers, where bandwidth saving is of importance, such as in 5G networks, aiming to provide high capacity and high mobility, simultaneously while saving spectrum.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133197481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Asynchronous reputation systems in device-to-device ecosystems 设备对设备生态系统中的异步信誉系统
Dimitris Chatzopoulos, P. Hui
Advances in device-to-device (D2D) ecosystems have brought on mobile applications that utilise nearby mobile devices in order to improve users' quality of experience (QoE). The interactions between the mobile devices have to be transparent to the end users and can be of many services - opportunistic networking, traffic offloading, computation offloading, cooperative streaming and P2P based k-anonymity location privacy service, to name a few. Whenever mobile users are willing to “ask for help” from their neighbours, they need to make non trivial decisions in order to maximise their utility. Current motivation approaches for mobile users that participate in such environments are of two types: (i) credit-based and (ii) reputation-based. These approaches rely either on centralised authorities or require prohibitively many messages or require tamper resistant security modules. In this paper we propose a trust-based approach that does not require synchronisation between the mobile users. Moreover, we present the three-way tradeoff between, consistency, message exchange and awareness and we conclude that our approach can provide first-rate data to neighbour selection mechanisms for D2D ecosystems with much less overhead.
设备到设备(D2D)生态系统的进步带来了利用附近移动设备的移动应用程序,以提高用户的体验质量(QoE)。移动设备之间的交互必须对最终用户透明,并且可以提供许多服务——机会网络、流量卸载、计算卸载、协作流和基于k-匿名的P2P位置隐私服务,仅举几例。每当移动用户愿意向邻居“寻求帮助”时,他们都需要做出重要的决定,以最大化自己的效用。目前对于参与此类环境的移动用户的激励方法有两种类型:(i)基于信用和(ii)基于声誉。这些方法要么依赖于集中的权威机构,要么需要大量的消息,要么需要防篡改的安全模块。在本文中,我们提出了一种基于信任的方法,该方法不需要在移动用户之间进行同步。此外,我们提出了一致性、信息交换和意识之间的三方权衡,并得出结论,我们的方法可以以更少的开销为D2D生态系统的邻居选择机制提供一流的数据。
{"title":"Asynchronous reputation systems in device-to-device ecosystems","authors":"Dimitris Chatzopoulos, P. Hui","doi":"10.1145/2944789.2944873","DOIUrl":"https://doi.org/10.1145/2944789.2944873","url":null,"abstract":"Advances in device-to-device (D2D) ecosystems have brought on mobile applications that utilise nearby mobile devices in order to improve users' quality of experience (QoE). The interactions between the mobile devices have to be transparent to the end users and can be of many services - opportunistic networking, traffic offloading, computation offloading, cooperative streaming and P2P based k-anonymity location privacy service, to name a few. Whenever mobile users are willing to “ask for help” from their neighbours, they need to make non trivial decisions in order to maximise their utility. Current motivation approaches for mobile users that participate in such environments are of two types: (i) credit-based and (ii) reputation-based. These approaches rely either on centralised authorities or require prohibitively many messages or require tamper resistant security modules. In this paper we propose a trust-based approach that does not require synchronisation between the mobile users. Moreover, we present the three-way tradeoff between, consistency, message exchange and awareness and we conclude that our approach can provide first-rate data to neighbour selection mechanisms for D2D ecosystems with much less overhead.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126627338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LVS: A WiFi-based system to tackle Location Spoofing in location-based services LVS:一个基于wifi的系统,用于解决基于位置的服务中的位置欺骗问题
Francesco Restuccia, A. Saracino, Sajal K. Das, F. Martinelli
The reliability of location-based services (LBS) is strongly dependent on the accuracy of the location of the users. However, existing LBS systems are not able to efficiently validate the position of users in large-scale outdoor environments, leading to possible location spoofing attacks by malicious users. To this end, we present an efficient and scalable Location Validation System (LVS) that secures LBS systems from location spoofing attacks. In particular, the user location is verified with the help of mobile WiFi hotspots (MHSs), who are users activating the WiFi hotspot capability of their smartphones and accept connections from nearby users, thereby validating their position inside the sensing area. The system also comprises a novel verification technique called Chains of Sight, which tackles collusion-based attacks effectively. LVS also includes a reputation-based algorithm that rules out sensing reports of location-spoofing users.
基于位置的服务(LBS)的可靠性很大程度上依赖于用户位置的准确性。然而,现有的LBS系统无法在大规模的户外环境中有效地验证用户的位置,可能会受到恶意用户的位置欺骗攻击。为此,我们提出了一种高效且可扩展的位置验证系统(LVS),可以保护LBS系统免受位置欺骗攻击。特别是,通过移动WiFi热点(mhs)来验证用户的位置,mhs是指激活智能手机的WiFi热点功能,接受附近用户的连接,从而验证其在传感区域内的位置。该系统还包括一种名为“视线链”(Chains of Sight)的新型验证技术,可以有效地应对基于串通的攻击。LVS还包括一个基于声誉的算法,可以排除对位置欺骗用户的感知报告。
{"title":"LVS: A WiFi-based system to tackle Location Spoofing in location-based services","authors":"Francesco Restuccia, A. Saracino, Sajal K. Das, F. Martinelli","doi":"10.1109/WoWMoM.2016.7523533","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523533","url":null,"abstract":"The reliability of location-based services (LBS) is strongly dependent on the accuracy of the location of the users. However, existing LBS systems are not able to efficiently validate the position of users in large-scale outdoor environments, leading to possible location spoofing attacks by malicious users. To this end, we present an efficient and scalable Location Validation System (LVS) that secures LBS systems from location spoofing attacks. In particular, the user location is verified with the help of mobile WiFi hotspots (MHSs), who are users activating the WiFi hotspot capability of their smartphones and accept connections from nearby users, thereby validating their position inside the sensing area. The system also comprises a novel verification technique called Chains of Sight, which tackles collusion-based attacks effectively. LVS also includes a reputation-based algorithm that rules out sensing reports of location-spoofing users.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123483532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A joint relay selection and buffer management scheme for delivery rate optimization in DTNs 基于中继选择和缓冲管理的ddn传输速率优化方案
Tuan Le, H. Kalantarian, M. Gerla
Due to the unstable network topology of Delay Tolerant Networks (DTNs), multi-copy routing is often used to increase the reliability of message delivery. However, this routing approach suffers from high buffer and bandwidth overhead. While much work has been done in the design of forwarding algorithms, little work has focused on studying forwarding under the presence of resource constraints such as short contact durations and small buffers. In this paper, we investigate a multi-copy routing strategy and a buffer management policy that maximize the delivery rate in DTNs. We consider a realistic DTN environment with resource constraints, heterogeneous node mobility, and varied message sizes. There are three key issues in DTN routing: (1) to which next hop relay node should messages be replicated, (2) in which order should messages be replicated, and (3) which messages should be dropped first when the buffer is full. We propose to forward a message to a neighboring node that has both a stronger social tie with the destination and a smaller or similar queue length. This aims to reduce traffic at highly connected network nodes, avoiding frequent message drops which compromise the delivery ratio. For the second and third issue, we develop a utility function using global network information to compute per-packet delivery rate utility. Messages are then scheduled and dropped according to their utility values. Extensive simulation results based on the real-world San Francisco cab trace show that our proposed scheme can achieve a delivery rate of up to 22% higher than existing schemes, while still maintaining a comparable average delivery delay. Furthermore, our scheme distributes the network loads more evenly, with the top 10% of network nodes handling only 24% of the forwardings.
由于容忍延迟网络(Delay tolerance network, DTNs)的网络拓扑结构不稳定,为了提高消息传递的可靠性,通常采用多副本路由。但是,这种路由方法存在较高的缓冲区和带宽开销。虽然在转发算法的设计方面已经做了很多工作,但很少有研究在短接触时间和小缓冲区等资源约束下的转发。在本文中,我们研究了一种多副本路由策略和缓冲区管理策略,以最大限度地提高ddn的传输速率。我们考虑一个具有资源约束、异构节点移动性和不同消息大小的现实DTN环境。在DTN路由中有三个关键问题:(1)消息应该被复制到哪个下一跳中继节点,(2)消息应该按照什么顺序被复制,(3)当缓冲区满时应该首先丢弃哪个消息。我们建议将消息转发到与目的地具有更强社会联系且队列长度较小或相似的相邻节点。这旨在减少高连接网络节点的流量,避免频繁的消息丢失,从而降低交付率。对于第二个和第三个问题,我们开发了一个使用全局网络信息的效用函数来计算每包传输速率效用。然后根据消息的效用值对消息进行调度和丢弃。基于真实的旧金山出租车轨迹的大量仿真结果表明,我们提出的方案可以实现比现有方案高出22%的交付率,同时仍然保持相当的平均交付延迟。此外,我们的方案更均匀地分配网络负载,前10%的网络节点仅处理24%的转发。
{"title":"A joint relay selection and buffer management scheme for delivery rate optimization in DTNs","authors":"Tuan Le, H. Kalantarian, M. Gerla","doi":"10.1109/WoWMoM.2016.7523549","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523549","url":null,"abstract":"Due to the unstable network topology of Delay Tolerant Networks (DTNs), multi-copy routing is often used to increase the reliability of message delivery. However, this routing approach suffers from high buffer and bandwidth overhead. While much work has been done in the design of forwarding algorithms, little work has focused on studying forwarding under the presence of resource constraints such as short contact durations and small buffers. In this paper, we investigate a multi-copy routing strategy and a buffer management policy that maximize the delivery rate in DTNs. We consider a realistic DTN environment with resource constraints, heterogeneous node mobility, and varied message sizes. There are three key issues in DTN routing: (1) to which next hop relay node should messages be replicated, (2) in which order should messages be replicated, and (3) which messages should be dropped first when the buffer is full. We propose to forward a message to a neighboring node that has both a stronger social tie with the destination and a smaller or similar queue length. This aims to reduce traffic at highly connected network nodes, avoiding frequent message drops which compromise the delivery ratio. For the second and third issue, we develop a utility function using global network information to compute per-packet delivery rate utility. Messages are then scheduled and dropped according to their utility values. Extensive simulation results based on the real-world San Francisco cab trace show that our proposed scheme can achieve a delivery rate of up to 22% higher than existing schemes, while still maintaining a comparable average delivery delay. Furthermore, our scheme distributes the network loads more evenly, with the top 10% of network nodes handling only 24% of the forwardings.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A study on identification of laser-tracked vehicles using V2V-based velocity information 基于v2v速度信息的激光履带车辆识别研究
Atsushi Fujita, H. Yamaguchi, T. Higashino, M. Takai
In recent years, several advanced safety techniques have been put to practical use for supporting safe driving, ASV (Advanced Safety Vehicle) can detect the presence of surrounding vehicles and pedestrians autonomously. On the other hand, cooperative techniques such as cooperative vehicle-to-vehicle awareness have attracted a lot of attentions in the field of ITS. In this paper, we propose a method for identifying positional relationship of vehicle groups. In the proposed method, connected vehicles share surrounding vehicles' positions detected by installed range sensors via inter-vehicle communication. By composing those pieces of information into a single view, each connected vehicle can recognize the vehicle group ahead, which cannot be recognized standalone. By utilizing the distance information from two different information sources and executing the matching process, the correct positional relationship among neighboring vehicles can obtain. We have conducted a simulation-based experiment using two types of data to evaluate the effectiveness of the approach, and we have confirmed to achieve the correct identification with high probability by using shared velocity information.
近年来,一些先进的安全技术已经投入实际应用,以支持安全驾驶,ASV(先进安全车辆)可以自动检测周围车辆和行人的存在。另一方面,协同车对车感知等协同技术在智能交通领域备受关注。本文提出了一种识别车辆群位置关系的方法。在该方法中,联网车辆通过车辆间通信共享安装的距离传感器检测到的周围车辆的位置。通过将这些信息组合到一个视图中,每辆联网车辆都可以识别前方的车辆组,而这些车辆组无法单独识别。利用来自两个不同信息源的距离信息,执行匹配过程,可以得到正确的相邻车辆之间的位置关系。我们利用两类数据进行了基于仿真的实验来评估该方法的有效性,并证实了利用共享速度信息可以实现高概率的正确识别。
{"title":"A study on identification of laser-tracked vehicles using V2V-based velocity information","authors":"Atsushi Fujita, H. Yamaguchi, T. Higashino, M. Takai","doi":"10.1109/WoWMoM.2016.7523568","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523568","url":null,"abstract":"In recent years, several advanced safety techniques have been put to practical use for supporting safe driving, ASV (Advanced Safety Vehicle) can detect the presence of surrounding vehicles and pedestrians autonomously. On the other hand, cooperative techniques such as cooperative vehicle-to-vehicle awareness have attracted a lot of attentions in the field of ITS. In this paper, we propose a method for identifying positional relationship of vehicle groups. In the proposed method, connected vehicles share surrounding vehicles' positions detected by installed range sensors via inter-vehicle communication. By composing those pieces of information into a single view, each connected vehicle can recognize the vehicle group ahead, which cannot be recognized standalone. By utilizing the distance information from two different information sources and executing the matching process, the correct positional relationship among neighboring vehicles can obtain. We have conducted a simulation-based experiment using two types of data to evaluate the effectiveness of the approach, and we have confirmed to achieve the correct identification with high probability by using shared velocity information.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117315592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
QoE aware video content adaptation and delivery QoE意识视频内容的改编和交付
P. Kamaraju, P. Lungaro, Z. Segall
The explosion of traffic associated with video content poses significant challenges for mobile content provision. While, on the one hand, mobile video traffic surge is forecast-ed to require significant investments in bandwidth acquisition and infrastructure dimensioning and roll-out, on the other hand, users are not likely to be willing to pay significantly more than today. This increases the pressure to develop solutions capable of making the mobile provision of video more affordable without either affecting user experience or limiting usage. In this respect, this paper proposes a novel methodology for video content delivery which is based on a user video quality perception model. According to this scheme, the video quality of each scene in a movie is selected, from among a finite set of available qualities, with the purpose of reducing the overall bandwidth required to attain a given user experience level targeted by the system for each user and each video. This novel methodology also adopts a clustering approach to identify users with similar Quality of Experience (QoE) profiles and leverages this information for improving the accuracy of user perceived quality predictions. This approach has been validated through a crowd-sourced subjective test evaluation performed with real users using a novel method involving the Amazon Mechanical Turk platform. The results showed that the proposed method is capable of achieving a prediction accuracy in the order of ±0.5 MOS points. This approach can be effectively used to select the video qualities minimizing bandwidth costs while delivering predefined level of perceived quality to the end users.
视频内容相关流量的爆炸式增长给移动内容提供带来了重大挑战。一方面,移动视频流量的激增预计需要在带宽获取和基础设施规模和部署方面进行大量投资,另一方面,用户不太可能愿意比现在支付更多的钱。这增加了开发解决方案的压力,使移动视频提供更实惠,同时又不会影响用户体验或限制使用。在这方面,本文提出了一种基于用户视频质量感知模型的视频内容交付新方法。根据该方案,从有限的可用质量集中选择电影中每个场景的视频质量,目的是减少系统为每个用户和每个视频达到给定用户体验水平所需的总带宽。这种新颖的方法还采用聚类方法来识别具有相似体验质量(QoE)配置文件的用户,并利用这些信息来提高用户感知质量预测的准确性。这种方法已经通过一种涉及Amazon Mechanical Turk平台的新方法,由真实用户进行的众包主观测试评估得到了验证。结果表明,该方法能够达到±0.5 MOS点的预测精度。这种方法可以有效地用于选择视频质量,最小化带宽成本,同时向最终用户提供预定义的感知质量水平。
{"title":"QoE aware video content adaptation and delivery","authors":"P. Kamaraju, P. Lungaro, Z. Segall","doi":"10.1109/WoWMoM.2016.7523556","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523556","url":null,"abstract":"The explosion of traffic associated with video content poses significant challenges for mobile content provision. While, on the one hand, mobile video traffic surge is forecast-ed to require significant investments in bandwidth acquisition and infrastructure dimensioning and roll-out, on the other hand, users are not likely to be willing to pay significantly more than today. This increases the pressure to develop solutions capable of making the mobile provision of video more affordable without either affecting user experience or limiting usage. In this respect, this paper proposes a novel methodology for video content delivery which is based on a user video quality perception model. According to this scheme, the video quality of each scene in a movie is selected, from among a finite set of available qualities, with the purpose of reducing the overall bandwidth required to attain a given user experience level targeted by the system for each user and each video. This novel methodology also adopts a clustering approach to identify users with similar Quality of Experience (QoE) profiles and leverages this information for improving the accuracy of user perceived quality predictions. This approach has been validated through a crowd-sourced subjective test evaluation performed with real users using a novel method involving the Amazon Mechanical Turk platform. The results showed that the proposed method is capable of achieving a prediction accuracy in the order of ±0.5 MOS points. This approach can be effectively used to select the video qualities minimizing bandwidth costs while delivering predefined level of perceived quality to the end users.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129367037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Model-based Beacon Scheduling algorithm for IEEE 802.15.4e TSCH networks IEEE 802.15.4e TSCH网络中基于模型的信标调度算法
Domenico De Guglielmo, Simone Brienza, G. Anastasi
Time Slotted Channel Hopping (TSCH) is an emerging MAC protocol defined in the IEEE 802.15.4e standard. By combining time slotted access with multi-channel and channel hopping capabilities, it is particularly suitable for critical applications that require high reliability and deterministic latency. In this paper we focus on the formation process of TSCH networks. This relies on periodic advertisement of Enhanced Beacons (EBs), however, the standard does not specify any advertising strategy. By taking a theoretical approach, we first derive a general model of the network formation process and provide an analytical formulation of the average joining time (i.e., the time taken by a node to join the network). Then, we derive an optimal strategy for scheduling EB transmissions that minimizes the average joining time. Finally, we propose a new Model-based Beacon Scheduling (MBS) algorithm that approximates the optimal strategy in real networks. We evaluate the performance of MBS by simulation. Our results show that the proposed algorithm outperforms previous solutions present in the literature.
时隙信道跳频(TSCH)是IEEE 802.15.4e标准中定义的一种新兴的MAC协议。通过将时隙访问与多信道和信道跳变功能相结合,它特别适用于需要高可靠性和确定性延迟的关键应用程序。本文主要研究TSCH网络的形成过程。这依赖于增强型信标(EBs)的定期广告,但是,该标准没有规定任何广告策略。通过理论方法,我们首先推导了网络形成过程的一般模型,并提供了平均加入时间(即节点加入网络所需的时间)的解析公式。然后,我们得出了一个调度EB传输的最优策略,使平均连接时间最小化。最后,我们提出了一种新的基于模型的信标调度(MBS)算法,该算法近似于实际网络中的最优策略。我们通过仿真来评估MBS的性能。我们的结果表明,所提出的算法优于文献中提出的先前解决方案。
{"title":"A Model-based Beacon Scheduling algorithm for IEEE 802.15.4e TSCH networks","authors":"Domenico De Guglielmo, Simone Brienza, G. Anastasi","doi":"10.1109/WoWMoM.2016.7523517","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523517","url":null,"abstract":"Time Slotted Channel Hopping (TSCH) is an emerging MAC protocol defined in the IEEE 802.15.4e standard. By combining time slotted access with multi-channel and channel hopping capabilities, it is particularly suitable for critical applications that require high reliability and deterministic latency. In this paper we focus on the formation process of TSCH networks. This relies on periodic advertisement of Enhanced Beacons (EBs), however, the standard does not specify any advertising strategy. By taking a theoretical approach, we first derive a general model of the network formation process and provide an analytical formulation of the average joining time (i.e., the time taken by a node to join the network). Then, we derive an optimal strategy for scheduling EB transmissions that minimizes the average joining time. Finally, we propose a new Model-based Beacon Scheduling (MBS) algorithm that approximates the optimal strategy in real networks. We evaluate the performance of MBS by simulation. Our results show that the proposed algorithm outperforms previous solutions present in the literature.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"23 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116264804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Storage on wheels: Offloading popular contents through a vehicular cloud 车轮上的存储:通过车载云卸载流行内容
Luigi Vigneri, T. Spyropoulos, C. Barakat
The increasing demand for mobile data is overloading the cellular infrastructure. Small cells and edge caching is being explored as an alternative, but installation and maintenance costs for sufficient coverage are significant. In this work, we perform a preliminary study of an alternative architecture based on two main ideas: (i) using vehicles as mobile caches that can be accessed by user devices; compared to small cells, vehicles are more widespread and require lower costs; (ii) combining the mobility of vehicles with delayed content access to increase the number of cache hits (and reduce the load on the infrastructure). Contrary to standard DTN-type approaches, in our system max delays are guaranteed to be kept to a few minutes (beyond this deadline, the content is fetched from the infrastructure). We first propose an analytical framework to compute the optimal number of content replicas that one should cache, in order to minimize the infrastructure load. We then investigate how to optimally refresh these caches to introduce new contents, as well as to react to the temporal variability in content popularity. Simulations suggest that our vehicular cloud considerably reduces the infrastructure load in urban settings, assuming modest penetration rates and tolerable content access delays.
对移动数据日益增长的需求使蜂窝基础设施不堪重负。小型单元和边缘缓存正在作为替代方案进行探索,但是要实现足够的覆盖,安装和维护成本非常高。在这项工作中,我们对基于两个主要思想的替代架构进行了初步研究:(i)使用车辆作为可由用户设备访问的移动缓存;与小型电池相比,汽车的使用范围更广,成本也更低;(ii)将车辆的移动性与延迟内容访问相结合,以增加缓存命中的数量(并减少基础设施的负载)。与标准dtn类型的方法相反,在我们的系统中,最大延迟保证保持在几分钟内(超过此截止日期,将从基础设施获取内容)。我们首先提出了一个分析框架来计算应该缓存的内容副本的最佳数量,以最小化基础设施负载。然后,我们将研究如何以最佳方式刷新这些缓存以引入新内容,以及如何对内容受欢迎程度的时间变化做出反应。模拟表明,我们的车载云在假设适度的渗透率和可容忍的内容访问延迟的情况下,大大减少了城市环境中的基础设施负载。
{"title":"Storage on wheels: Offloading popular contents through a vehicular cloud","authors":"Luigi Vigneri, T. Spyropoulos, C. Barakat","doi":"10.1109/WoWMoM.2016.7523506","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523506","url":null,"abstract":"The increasing demand for mobile data is overloading the cellular infrastructure. Small cells and edge caching is being explored as an alternative, but installation and maintenance costs for sufficient coverage are significant. In this work, we perform a preliminary study of an alternative architecture based on two main ideas: (i) using vehicles as mobile caches that can be accessed by user devices; compared to small cells, vehicles are more widespread and require lower costs; (ii) combining the mobility of vehicles with delayed content access to increase the number of cache hits (and reduce the load on the infrastructure). Contrary to standard DTN-type approaches, in our system max delays are guaranteed to be kept to a few minutes (beyond this deadline, the content is fetched from the infrastructure). We first propose an analytical framework to compute the optimal number of content replicas that one should cache, in order to minimize the infrastructure load. We then investigate how to optimally refresh these caches to introduce new contents, as well as to react to the temporal variability in content popularity. Simulations suggest that our vehicular cloud considerably reduces the infrastructure load in urban settings, assuming modest penetration rates and tolerable content access delays.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126531267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An autonomous diagnostic tool for the WirelessHART industrial standard 无线shart工业标准的自动诊断工具
Duarte M. G. Raposo, A. Rodrigues, J. Silva, F. Boavida, Jose E. G. Oliveira, Carlos Herrera, Carlos Egas
Over the last years, Wireless Sensor Networks (WSN) went from being a promising technology for countless industrial applications to a de facto technology used in todays' applications. WSNs have been gaining momentum over costly wired technologies, offering low installation costs, self-organization, and added functionality. As a consequence of their enormous potential, WSNs were subject to standardization and some industrial standards and open source solutions like WirelessHART, Zigbee, ISA100, IEEE802.15.4 and OpenWSN were announced. However, despite considerable efforts to provide mechanisms that increase the availability, reliability, security and maintainability of this type of networks, WSNs have kept one of their main characteristics: fault-proneness. As a result, the offer of post-deployment diagnostic tools has been increasing in the last decade in order to diagnose WSN failures as soon as possible. Nevertheless, current WSN diagnostic tools still have many limitations and cannot be considered “ready to use” in real-world scenarios. In this paper we present an autonomous diagnostic tool that addresses these limitations in a real industrial Internet of Things (IIoT) scenario. Our tool is based on simple metrics, a logging tool, a data-mining algorithm, and available network metrics, and it monitors the condition of the sensor nodes firmware, hardware and the network itself. The proposed demonstration was tested and validated using the WirelessHART IIoT standard.
在过去的几年里,无线传感器网络(WSN)从无数工业应用的一项有前途的技术发展成为当今应用中使用的事实上的技术。无线传感器网络的发展势头已经超过了昂贵的有线技术,它提供了低安装成本、自组织和附加功能。由于其巨大的潜力,无线传感器网络被标准化,一些工业标准和开源解决方案,如WirelessHART, Zigbee, ISA100, IEEE802.15.4和OpenWSN被公布。然而,尽管在提供提高这种类型网络的可用性、可靠性、安全性和可维护性的机制方面做出了相当大的努力,wsn仍然保持了其主要特征之一:易出错性。因此,在过去十年中,为了尽快诊断WSN故障,部署后诊断工具的提供一直在增加。然而,目前的WSN诊断工具仍然有许多局限性,不能被认为是“可以在现实场景中使用”。在本文中,我们提出了一种自主诊断工具,解决了真实工业物联网(IIoT)场景中的这些限制。我们的工具基于简单的指标、日志工具、数据挖掘算法和可用的网络指标,它监视传感器节点固件、硬件和网络本身的状况。使用wireless shart IIoT标准对拟议的演示进行了测试和验证。
{"title":"An autonomous diagnostic tool for the WirelessHART industrial standard","authors":"Duarte M. G. Raposo, A. Rodrigues, J. Silva, F. Boavida, Jose E. G. Oliveira, Carlos Herrera, Carlos Egas","doi":"10.1109/WOWMOM.2016.7523536","DOIUrl":"https://doi.org/10.1109/WOWMOM.2016.7523536","url":null,"abstract":"Over the last years, Wireless Sensor Networks (WSN) went from being a promising technology for countless industrial applications to a de facto technology used in todays' applications. WSNs have been gaining momentum over costly wired technologies, offering low installation costs, self-organization, and added functionality. As a consequence of their enormous potential, WSNs were subject to standardization and some industrial standards and open source solutions like WirelessHART, Zigbee, ISA100, IEEE802.15.4 and OpenWSN were announced. However, despite considerable efforts to provide mechanisms that increase the availability, reliability, security and maintainability of this type of networks, WSNs have kept one of their main characteristics: fault-proneness. As a result, the offer of post-deployment diagnostic tools has been increasing in the last decade in order to diagnose WSN failures as soon as possible. Nevertheless, current WSN diagnostic tools still have many limitations and cannot be considered “ready to use” in real-world scenarios. In this paper we present an autonomous diagnostic tool that addresses these limitations in a real industrial Internet of Things (IIoT) scenario. Our tool is based on simple metrics, a logging tool, a data-mining algorithm, and available network metrics, and it monitors the condition of the sensor nodes firmware, hardware and the network itself. The proposed demonstration was tested and validated using the WirelessHART IIoT standard.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114757716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The SIMulation project: Demonstrating mobile payments based on cloud services 模拟项目:演示基于云服务的移动支付
P. Urien, Xavier Aghina
This demonstration shows the mobile payment platform based on cloud services, designed by the SIMulation project. This project is a joint research effort from a major French mobile operator and an academic research institute. NFC payments cards are hosted in RACS payment servers. These are remotely used thanks to internet enable smart phones acting as logical bridge between the merchant terminal and the payment server. The communication security is enforced by the SIM module plugged in the mobile and fully processing the TLS protocol.
本次演示展示了仿真项目设计的基于云服务的移动支付平台。该项目是法国一家主要移动运营商和一家学术研究机构的联合研究成果。NFC支付卡托管在RACS支付服务器中。由于互联网使智能手机成为商家终端和支付服务器之间的逻辑桥梁,这些都可以远程使用。通信安全是通过插入手机的SIM模块来实现的,并充分处理TLS协议。
{"title":"The SIMulation project: Demonstrating mobile payments based on cloud services","authors":"P. Urien, Xavier Aghina","doi":"10.1109/WoWMoM.2016.7523535","DOIUrl":"https://doi.org/10.1109/WoWMoM.2016.7523535","url":null,"abstract":"This demonstration shows the mobile payment platform based on cloud services, designed by the SIMulation project. This project is a joint research effort from a major French mobile operator and an academic research institute. NFC payments cards are hosted in RACS payment servers. These are remotely used thanks to internet enable smart phones acting as logical bridge between the merchant terminal and the payment server. The communication security is enforced by the SIM module plugged in the mobile and fully processing the TLS protocol.","PeriodicalId":187747,"journal":{"name":"2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125648996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1